CryptoDB
Multiplicative Masking and Power Analysis of AES
Authors: | |
---|---|
Download: | |
Abstract: | The recently proposed multiplicative masking countermeasure against power analysis attacks on AES is interesting as it does not require the costly recomputation and RAM storage of S-boxes for every run of AES. This is important for applications where the available space is very limited such as the smart card applications. Unfortunately, it is here shown that this method is in fact inherently vulnerable to differential power analysis. Other possible random masking methods are also discussed. |
BibTeX
@misc{eprint-2002-11614, title={Multiplicative Masking and Power Analysis of AES}, booktitle={IACR Eprint archive}, keywords={secret-key cryptography / AES, differential power analysis, countermeasures, multiplicative masking}, url={http://eprint.iacr.org/2002/091}, note={Presented at (internal) Gemplus Quarterly meeting, La Ciotat, France, October 30-31, 2001. jovan.golic@gemplus.com 11876 received 8 Jul 2002}, author={Jovan Dj. Goli\'{c}}, year=2002 }